top of page
Company Insights
See the plethora of company insights on Security, Compliance, Management and Risk.
Ascent Portal Staff
Aug 4, 20212 min read
Risk Treatment and Mitigation
Organizations need to have defined processes in place for completing risk treatment and risk mitigation activities once a risk assessment...
Ascent Portal Staff
Jul 30, 20212 min read
Regular Risk Assessments Are Required
Once organizations have developed a risk management strategy and a risk management program, regular risk assessments should be performed...
Ascent Portal Staff
Jul 16, 20212 min read
Security and Compliance Documentation Management
As promised, here is the second blog post of this week regarding the pitfalls from my eBook, Security Program Pitfalls and Prescription...
Ascent Portal Staff
Jul 12, 20212 min read
Pitfall #7:Secuirty Program Continuous Monitoring
This week, I’ll be posting two blog posts regarding the pitfalls from my eBook, Security Program Pitfalls and Prescription to Avoid Them....
Ascent Portal Staff
Jul 7, 20212 min read
Independent Reviews of the Security Program
With the Independence Day holiday earlier this week, the pitfall I’m highlighting here from my eBook, Security Program Pitfalls and...
Ascent Portal Staff
Jun 24, 20212 min read
Pitfall #4 of 100: Security Program Roles and Responsibilities
The next pitfall from my eBook, Security Program Pitfalls and Prescription to Avoid Them, that I’d like to highlight in this blog post is...
Ascent Portal Staff
Jun 23, 20212 min read
Pitfall #3 of 100: Management Commitment to the Security Program
As part of our quest to highlight different pitfalls from my eBook Security Program Pitfalls and Prescription to Avoid Them, this blog...
Ascent Portal Staff
Jun 16, 20212 min read
Pitfall #2 of 100: Security Policies, Plans, and Procedures
Over the next year or so, we’ll be highlighting a different pitfall each week from the eBook Security Program Pitfalls and Prescription...
Ascent Portal Staff
Jun 10, 20212 min read
Pitfall #1 of 100: Documented Security Program Plan
It all starts with a plan. If a Security Program Plan is not developed, documented, and effectively communicated to all stakeholders,...
bottom of page